PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

What hacking attack is challenge/response authentication used to prevent?

What hacking attack is challenge/response authentication used to prevent?

What is the next step to be done?

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anything’ or 1=1 ” in the username field of an authentication form. This is the output returned from the server.
What is the next step to be done?

Why do you think this is possible?

Annie has just succeeded in stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible?

Assuming an attacker wants to penetrate John's network, which of the following options is he likely to ch

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.

Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail me

You are sniffing an unprotected WiFI network located in a JonDonalds Cybercafe with Ethereal to capture hotmail e-mail traffic. You see lots of people using their laptops browsing the web while sipping brewed coffee from JonDonalds. You want to sniff their e-mail messages traversing the unprotected WiFi network.
Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail messages?


Page 51 of 125« First...102030...4950515253...607080...Last »